Tancrède Lepoint

Orcid: 0000-0003-3796-042X

Affiliations:
  • Amazon Web Services, Seattle, USA


According to our database1, Tancrède Lepoint authored at least 67 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Verifying the Fisher-Yates Shuffle Algorithm in Dafny.
CoRR, January, 2025

Verified Foundations for Differential Privacy.
Proc. ACM Program. Lang., 2025

Safe Validation of Pricing Agreements.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2025

Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

2024
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium.
IACR Cryptol. ePrint Arch., 2024

2023
Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments.
IACR Cryptol. ePrint Arch., 2023

Security Analysis of Signature Schemes with Key Blinding.
IACR Cryptol. ePrint Arch., 2023

ACORN: Input Validation for Secure Aggregation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Vision Paper: Do We Need to Change Some Things? - Open Questions Posed by the Upcoming Post-quantum Migration to Existing Standards and Deployments.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023

2022
Publicly verifiable anonymous tokens with private metadata bit.
IACR Cryptol. ePrint Arch., 2022

In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Advances and Open Problems in Federated Learning.
Found. Trends Mach. Learn., 2021

Communication-Computation Trade-offs in PIR.
Proceedings of the 30th USENIX Security Symposium, 2021

On the (in)security of ROS.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Private Join and Compute from PIR with Default.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
On the (in)security of ROS.
IACR Cryptol. ePrint Arch., 2020

Anonymous Tokens with Private Metadata Bit.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Secure Single-Server Aggregation with (Poly)Logarithmic Overhead.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems.
Future Gener. Comput. Syst., 2019

Advances and Open Problems in Federated Learning.
CoRR, 2019

New Techniques for Obfuscating Conjunctions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Public-Key Function-Private Hidden Vector Encryption (and More).
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance.
J. Cryptol., 2018

Toward an Internet of Battlefield Things: A Resilience Perspective.
Computer, 2018


BlockCIS - A Blockchain-Based Cyber Insurance System.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Risks and Benefits of Side-Channels in Battlefields.
Proceedings of the 21st International Conference on Information Fusion, 2018

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

Delegating Elliptic-Curve Operations with Homomorphic Encryption.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
CRYSTALS - Dilithium: Digital Signatures from Module Lattices.
IACR Cryptol. ePrint Arch., 2017

CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM.
IACR Cryptol. ePrint Arch., 2017

Optimization of Bootstrapping in Circuits.
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 2017

Zeroizing Attacks on Indistinguishability Obfuscation over CLT13.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Abduction by Non-Experts.
Proceedings of the IWIL@LPAR 2017 Workshop and LPAR-21 Short Presentations, 2017

Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

NFLlib: NTT-Based Fast Lattice Library.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Cryptanalysis of GGH15 Multilinear Maps.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
How to Compress Homomorphic Ciphertexts.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of the Quadratic Zero-Testing of GGH.
IACR Cryptol. ePrint Arch., 2015

Trap Me If You Can - Million Dollar Curve.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR.
Proceedings of the Financial Cryptography and Data Security, 2015

Cryptanalysis of the Co-ACD Assumption.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

New Multilinear Maps Over the Integers.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Design and Implementation of Lattice-Based Cryptography. (Conception and implémentation de cryptographie à base de réseaux).
PhD thesis, 2014

Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers.
IACR Cryptol. ePrint Arch., 2014

Scale-Invariant Fully Homomorphic Encryption over the Integers.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

A Comparison of the Homomorphic Encryption Schemes FV and YASHE.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Another Nail in the Coffin of White-Box AES Implementations.
IACR Cryptol. ePrint Arch., 2013

Batch Fully Homomorphic Encryption over the Integers.
IACR Cryptol. ePrint Arch., 2013

Two Attacks on a White-Box AES Implementation.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

White-Box Security Notions for Symmetric Encryption Schemes.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

On the Minimal Number of Bootstrappings in Homomorphic Circuits.
Proceedings of the Financial Cryptography and Data Security, 2013

Batch Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology, 2013

Lattice Signatures and Bimodal Gaussians.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Practical Multilinear Maps over the Integers.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Partial Key Exposure on RSA with Private Exponents Larger Than N.
Proceedings of the Information Security Practice and Experience, 2012

2011
Traitor tracing schemes for protected software implementations.
Proceedings of the 11th ACM Workshop on Digital Rights Management, 2011


  Loading...